To sync with LDAP/MSAD you need to configure some parameters according to the vendor you're using. Currently only MSAD is supported, but you can use other configurations using a custom profile. See also How to Install the CloudGen Access User Directory Connector.
MSAD
Example configuration parameters (config.json file) for an MSAD installation:
{ enrollment_token="https://enterprise.fyde......", ldap_host="192.168.1.169", ldap_profile="ad", ldap_user_search_base="ou=Users,ou=MyOrg,dc=myorg,dc=com", ldap_group_search_base="ou=Groups,ou=MyOrg,dc=myorg,dc=com", ldap_auth_method="simple", ldap_auth_username="User Name", ldap_auth_password="password" }
Configuration Parameters
The LDAP-specific parameters are listed in the tables below. See also General parameters. Note that you only need prefix the key with "FYDE_"... and capitalize the rest if you are using an environment variable, but not with a configuration file or a Vx.
Basic Connection And Auth
Key | Default Value | Type | Description |
ldap_host | string | LDAP server hostname/IP to connect to | |
ldap_port | 389 or 636 (TLS) | string | LDAP server port to connect to |
ldap_auth_method | string | Authentication methods:
| |
ldap_auth_username | string | Username for | |
ldap_auth_password | string | Password for | |
ldap_auth_sasl_credentials | string | SASL credentials for SASL auth method | |
ldap_use_starttls | true | bool | Use StartTLS for LDAP |
ldap_use_tls | false | bool | Connect to LDAP using TLS |
ldap_sni | false | string | Use SNI hostname when using TLS |
ldap_privkey | string | Specify private key for TLS auth | |
ldap_privkey_password | string | Specify private key password for TLS auth | |
ldap_pubkey | string | Specify public key for TLS auth | |
ldap_cacerts | string | Specify CA trusted certs | |
ldap_check_certs | true | bool | Check if server certs are trusted or not |
ldap_check_hostname | true | bool | Check hostname on the certificate |
ldap_cert_additional_names | string | Specify additional valid hostnames |
More Advanced Options
Key | Default Value | Type | Description |
ldap_debug_detail_level | error | string | LDAP level debugging levels:
Options:
|
ldap_profile | ad | string | Enables vendor specific configurations. Options:
|
ldap_connect_timeout | 10 | string | Connection timeout for the LDAP server (in seconds) |
ldap_receive_timeout | 60 | string | Receive timeout |
ldap_ignore_malformed_schema | false | bool | Ignore errors caused by malformed schemas |
ldap_user_search_base | string | Search query to find user objects | |
ldap_user_class_filter | string | Search base to find user objects | |
ldap_user_search_scope | subtree | string | Scope to find user objects. Options:
|
ldap_user_uuid | string | Specify user UUID attribute | |
ldap_user_name | string | Attribute to get user name from | |
ldap_user_phone | string | Attribute to get user phone from | |
ldap_user_email | string | Attribute to get user email from | |
ldap_user_disabled_filter | string | Attribute to get user disabled state from | |
ldap_user_modified | string | Attribute to check user for last modification | |
ldap_user_deleted_filter | string | Search query to find deleted users | |
ldap_user_deleted_controls | string | Control OID for user deleted | |
ldap_group_search_base | string | Search query to find group objects | |
ldap_group_class_filter | string | Search base to find group objects | |
ldap_group_search_scope | subtree | string | Scope to find group objects. Options:
|
ldap_group_uuid | string | Specify group UUID attribute | |
ldap_group_name | string | Attribute to get group name from | |
ldap_group_modified | string | Attribute to check group for last modification | |
ldap_group_deleted_filter | string | Search query to find deleted groups | |
ldap_group_deleted_controls | string | Control OID for group deleted | |
ldap_membership_object | group | string | Scope to find group objects. Options:
|
ldap_membership_attribute | string | LDA membership attribute |